General

  • Target

    8ce52e39e0e6e87d152829f4b402bdf48e01e90ca7dfc17faca824b70a823224

  • Size

    1.4MB

  • Sample

    221123-xrle7sag6x

  • MD5

    25af15bc8c3672441e9464b85fa3742f

  • SHA1

    be922be883f20843964af7b34efa1d8ac45b3c34

  • SHA256

    8ce52e39e0e6e87d152829f4b402bdf48e01e90ca7dfc17faca824b70a823224

  • SHA512

    1c19ff806c8a8accf77abd760b72f3d0badbbbffe8d56c9fd2bae82e4c4301d8becdb61e6435e9fee1d8d99f0f74d11bb513a6e06273ff8928cd78795ab0c6e4

  • SSDEEP

    3072:CYsgk+ruvdasTt9NHhayrHlbGAP1Qm02B545g4FuB3bBo6P6We0VyOjUout:Vr/oS

Malware Config

Targets

    • Target

      8ce52e39e0e6e87d152829f4b402bdf48e01e90ca7dfc17faca824b70a823224

    • Size

      1.4MB

    • MD5

      25af15bc8c3672441e9464b85fa3742f

    • SHA1

      be922be883f20843964af7b34efa1d8ac45b3c34

    • SHA256

      8ce52e39e0e6e87d152829f4b402bdf48e01e90ca7dfc17faca824b70a823224

    • SHA512

      1c19ff806c8a8accf77abd760b72f3d0badbbbffe8d56c9fd2bae82e4c4301d8becdb61e6435e9fee1d8d99f0f74d11bb513a6e06273ff8928cd78795ab0c6e4

    • SSDEEP

      3072:CYsgk+ruvdasTt9NHhayrHlbGAP1Qm02B545g4FuB3bBo6P6We0VyOjUout:Vr/oS

    • Modifies firewall policy service

    • Modifies security service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Sets file execution options in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks